EFTA00752490.pdf

DataSet-9 2 pages 448 words document
V9
👁 1 💬 0
📄 Extracted Text (448 words)
From: Pablos To: Jeffrey Epstein <[email protected]> Subject: Re: Project discussion & proposal document attached Date: Fri, 05 Nov 2010 18:01:53 +0000 Jeffrey, Thanks for the offer, these are exciting concepts to be working with. Honestly, as much as I love the challenge, I'm out of my league in these discussions. I'm sorely undereducated about biology, and would just add to the noise floor. This proposal describes a pretty cool event, but it does feel like getting together a pretty obvious group of folks who probably know each other's work already. What I could imagine contributing would be some of our experience in hacking computer systems. This comes less from the academic & theoretical world these guys are in, and more from the trenches of trying to fuck with engineered systems to get them to do what they aren't supposed to. In practice, when breaking crypto systems we rarely attack "the math" but the implementation. There are always implementation flaws. A weak random number generator, timing attacks, ways to cross the threshold between data and code. So, for our part, I could imagine taking a group of academic experts like you have in this proposal and describing lots of the attacks we use on computers to see if they can come up with biological analogues. It might be conceited, but I think of our techniques as "field tested" on computers so they might be constructive. I've probably got it backwards and I should be looking to these bio guys for ideas on how to break computers more effectively! Just go ahead with this event and let me throw a couple hackers into the mix. Pablos. On Nov 5, 2010, at 12:29 AM, Jeffrey Epstein wrote: I d rather do a conference on hacking in bioligy.. viruses hosts. self deception, encryption, code theory, Pablos, if you would like to organize a hacking in nature conference i will support. Forwarded message From: Charles L. Harper Date: Thu, Nov 4, 2010 at 10:30 PM Subject: Project discussion & proposal document attached To: Jeffrey Epstein <[email protected]> Dear Jeffrey, Please find attached a project discussion and proposal document in reply to your request. EFTA00752490 Allbest, Charles Harper The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. <EpsteinCryptoinNature 1 l-4-10.pdf> EFTA00752491
ℹ️ Document Details
SHA-256
66229de8d906c8d1e28c244b0d2f36f79eb3f26db3e3f6dca59fecf11d704997
Bates Number
EFTA00752490
Dataset
DataSet-9
Type
document
Pages
2

Community Rating

Sign in to rate this document

📋 What Is This?

Loading…
Sign in to add a description

💬 Comments 0

Sign in to join the discussion
Loading comments…
Link copied!